Techniques and system to monitor and log access of information based on system and user context using policies
First Claim
Patent Images
1. A method of managing information comprising:
- providing an organization having an information management system comprising one or more rules and policy abstractions stored at a policy server to manage information of the organization, wherein a rule comprises an expression having a policy abstraction;
within the organization, providing a user logged onto a client device and a confidential document managed by the information management system;
receiving at the information management system a profile of the client device, wherein the profile is based on the user and the client device;
at the information management system, determining a subset of the one or more rules of the policy server relevant to the profile, wherein a rule is relevant to the profile when the client device is capable of supporting a syntax format of the rule;
determining a first rule of the subset of the one or more rules in a first syntax format is not supported by the client device;
converting the first rule into a second syntax format, wherein the client device supports the second syntax format but not the first syntax format;
storing the subset of the one or more rules of the policy server on the client device including the first translated rule; and
when the user attempts to perform an operation on the confidential document, evaluating the one or more rules at the client device, without evaluating rules stored at the policy server, to determine whether to store information regarding the attempted operation in a storage location,wherein based on a first context expression of a first rule, approving the attempted operation will occur only during a particular time period, andbased on a second context expression of a second rule, approving the attempted operation will occur only when the user is in a particular location.
1 Assignment
0 Petitions
Accused Products
Abstract
An information management system approves or denies user requests to access information of the system. The information includes all types of information including documents and e-mail. The information management system is driven using a policy language having policies and policy abstractions. The information management system may approve or deny many different types of requests including opening a document or file, copying a file, printing a file, sending an e-mail, reading an e-mail, cut and paste of a portion of a document, saving a document, executing an application on a file, and many others.
-
Citations
25 Claims
-
1. A method of managing information comprising:
-
providing an organization having an information management system comprising one or more rules and policy abstractions stored at a policy server to manage information of the organization, wherein a rule comprises an expression having a policy abstraction; within the organization, providing a user logged onto a client device and a confidential document managed by the information management system; receiving at the information management system a profile of the client device, wherein the profile is based on the user and the client device; at the information management system, determining a subset of the one or more rules of the policy server relevant to the profile, wherein a rule is relevant to the profile when the client device is capable of supporting a syntax format of the rule; determining a first rule of the subset of the one or more rules in a first syntax format is not supported by the client device; converting the first rule into a second syntax format, wherein the client device supports the second syntax format but not the first syntax format; storing the subset of the one or more rules of the policy server on the client device including the first translated rule; and when the user attempts to perform an operation on the confidential document, evaluating the one or more rules at the client device, without evaluating rules stored at the policy server, to determine whether to store information regarding the attempted operation in a storage location, wherein based on a first context expression of a first rule, approving the attempted operation will occur only during a particular time period, and based on a second context expression of a second rule, approving the attempted operation will occur only when the user is in a particular location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of managing information comprising:
-
providing an organization having an information management system comprising one or more rules comprising a context expression stored on a server to manage information of the organization; within the organization, providing a user logged onto a client and a confidential document managed by the information management system; storing a subset of the one or more rules of the policy on the client, wherein the subset of one or more rules of the policy are supported by the client and a first rule of the subset of one or more rules comprises translating the first rule from a first syntax format not supported by the client to a second syntax format supported by the client; when the user attempts to perform an operation on the confidential document, evaluating the one or more rules at the client only to determine whether to store information regarding the attempted operation in a storage location, wherein based on a first context expression of a first rule, approving the attempted operation will occur only during a particular time period, and based on a second context expression of a second rule, approving the attempted operation will occur only when the user is in a particular location; after the evaluating, updating the one or more rules at the client with the rules stored at the server with one or more updated rules; and after the updating, when the user attempts to perform the operation on the confidential document, evaluating the one or more updated rules at the client only. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of managing information comprising:
-
providing an organization having an information management system comprising a policy server comprising one or more rules to manage information of the organization; within the organization, providing a user logged onto a device and a confidential document managed by the information management system; storing a subset of the one or more rules of the policy server on the device; converting at least one rule of the subset of the one or more rules from a first syntax format to a second syntax format, wherein the device supports the second syntax format but not the first syntax format; and when the user attempts to perform an operation on the confidential document, evaluating the one or more rules at the device to determine whether to store information regarding the attempted operation in a storage location, wherein based on a first context expression of a first rule, approving the attempted operation will occur only during a particular time period, and based on a second context expression of a second rule, approving the attempted operation will occur only when the user is in a particular location. - View Dependent Claims (25)
-
Specification